Re: Protocol Benchmarking (with Accept examples - long)
Larry Masinter ([email protected])
Wed, 2 Feb 1994 18:06:36 PST
While we're optimizing things, how about looking at the exchanges
necessary for an authenticated call. Right now, access control adds a
lot of exchanges. Couldn't you somehow send your credentials (oh, who
you are, with the time and the host ID of yourself and the destination
host signed with your private key) to the remote host in the initial
GET?